CN1735127A - Encrypting method and encrypting apparatus for image processing apparatus - Google Patents

Encrypting method and encrypting apparatus for image processing apparatus Download PDF

Info

Publication number
CN1735127A
CN1735127A CNA2005100722282A CN200510072228A CN1735127A CN 1735127 A CN1735127 A CN 1735127A CN A2005100722282 A CNA2005100722282 A CN A2005100722282A CN 200510072228 A CN200510072228 A CN 200510072228A CN 1735127 A CN1735127 A CN 1735127A
Authority
CN
China
Prior art keywords
encryption
key
data
rank
encryption key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2005100722282A
Other languages
Chinese (zh)
Inventor
樱井笃志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Toshiba Corp
Toshiba TEC Corp
Original Assignee
Toshiba Corp
Toshiba TEC Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Toshiba Corp, Toshiba TEC Corp filed Critical Toshiba Corp
Publication of CN1735127A publication Critical patent/CN1735127A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • G06F21/608Secure printing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/088Usage controlling of secret information, e.g. techniques for restricting cryptographic keys to pre-authorized uses, different access levels, validity of crypto-period, different key- or password length, or different strong and weak cryptographic algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)
  • Facsimile Transmission Control (AREA)

Abstract

There is disclosed an encrypting apparatus including a main controller. The main controller collectively controls reader 12 , read image processing circuit 13 , printer 18 , print image processing circuit 17 , buffer memories 14, 16 , encryption device 23 , decryption device 24 , foreign key detection circuit 47 and control panel 41 . An encryption key and level controller sets encryption strength to an arbitrary one level of two or more several levels when the encryption device encrypts the image data.

Description

The encryption method and the encryption device that are used for image processing apparatus
Technical field
The present invention relates to be used for the encryption method and the encryption device of image processing apparatus.
Background technology
In multi-function peripheral (MFP) (for example, digital copier etc. have the equipment of data storage function), there is the worry that to leak private data.For this reason, the guard method of private data has caused special concern.Hard disk drive (HDD) is mainly used in the realization data storage function.Data for duplicating, network printing output and scanning can be stored among the HDD, and are browsing and calling under the environment more freely.Yet administrative organization and company have many and personal information and business secret file associated.For this reason, these files should not be printed at an easy rate.
In most of section office of administrative organization and company and department, all required data encryption, and the cellular system that is used to carry out encryption is playing a role.
This cellular system is encrypted all data that are stored among the HDD with same levels.In the case, be used for the encrypted secret key code or be kept at the embedded software of device, or utilize hard key (hard key) to preserve.
Above-mentioned MFP device also can be used as printer except duplicating.In printer function, can utilize the secure printing output function that each print out task is provided with password.In the case, printout is saved, and the user determines print queue by the guidance panel on the device, enters password then, thereby obtains printout.
Yet all data that are stored among the HDD are all encrypted; In the case, all need authentication for all users.Administrative organization, especially, the mechanism that has a lot of secret affairs needs above-mentioned system.In fact, the data that protect are very limited in a lot of companies, and most of data do not have so high secrets.If the said firm has introduced the system that all users is required authentication query, operating efficiency must reduce so.
In recent years, illegal decryption technology has been obtained progress, for this reason, must improve Cipher Strength, with as the way that tackles non-law technology.On the other hand, do not distribute a plurality of keys to realize data encryption to uniform machinery.For this reason, in case key is open, all data that are stored in so in this machine all might be cracked.
As mentioned above, above-mentioned MFP device also can be used as printer except duplicating.The user can be sent to this MFP device with data by network from the place away from this MFP device.The data content that this mode sends might comprise important file.In the case, use the secure printing output function, can temporarily control output.Yet, need only import a password, just can carry out visit to print queue.And, if the data unencryption also can remove hard disk drive from device, subsequently, with data theft.
Be easy to from the above description find out that traditional device can not be guaranteed enough fail safes for classified papers.In addition, when when being similar to the data encryption of copy, adopted the cryptographic system of using same key; In the case, enough fail safes have been given hardly.
Summary of the invention
According to an aspect of the present invention, purpose is to provide a kind of encryption method and encryption device that is used to have the image processing apparatus of a plurality of data encryption intensity ranks.
According to an embodiment of the invention, a kind of encryption device that is used for image processing apparatus is provided, comprising: reader is used for reading images; The reading images treatment circuit is used to handle the image that is read; Printer is carried out the printing to medium; The print image treatment circuit is used to carry out at the print image of printing and handles; Buffer storage is used for view data and handles; Encryption device is encrypted the view data that inputs to buffer storage; Storage device is used to store encrypted data; Decryption device is with the view data deciphering of having encrypted; The external key testing circuit is used to discern hard key; Guidance panel comprises that the user is used for carrying out the control panel of various settings and being used to import ID and the password that is used for personal authentication's program; Master controller is totally controlled above-mentioned reader, reading images treatment circuit, printer, print image treatment circuit, buffer storage, encryption device, decryption device, external key testing circuit and guidance panel; And encryption key and rank controller, being used for when the encryption device encrypted image data, Cipher Strength is set to any one rank in two or more ranks.
Other features and advantages of the present invention provide in the following description, and a part wherein can obviously be found out from this specification for a person skilled in the art, maybe can recognize from the enforcement of present disclosure.Objects and advantages of the present invention can realize and obtain by following enforcement of specifically noting and combination.
Description of drawings
These accompanying drawings show preferred implementation of the present invention, and its introducing also constitutes the application's a part, and with the describe, in general terms that provides above with below the detailed description of the execution mode that provides is explained principle of the present invention.
Fig. 1 is the block diagram of the structure of expression image processing system according to the embodiment of the present invention;
Fig. 2 A is used to illustrate the operation according to device of the present invention to the schematic diagram that shows embodiment of Fig. 2 F for the display part on the expression guidance panel;
Fig. 3 A is used to illustrate the operation according to device of the present invention to the schematic diagram of Fig. 3 D for another embodiment of the display part on the expression guidance panel;
Fig. 4 A is used to illustrate the operation according to device of the present invention to the schematic diagram of Fig. 4 G for another demonstration embodiment of the display part on the expression guidance panel;
Fig. 5 A is used to illustrate the operation according to device of the present invention to the schematic diagram of Fig. 5 D for another demonstration embodiment of the display part on the expression guidance panel;
Fig. 6 is the flow chart of explanation according to the operation (file scanning) of device of the present invention;
Fig. 7 is the flow chart of explanation according to another operation (printout) of device of the present invention;
Fig. 8 is the flow chart of explanation according to another operation (network printing output) of device of the present invention;
Fig. 9 is the again flow chart of an operation (personal authentication data entry) of explanation according to device of the present invention;
Figure 10 is the flow chart of explanation according to the another operation (personal authentication's data check) of device of the present invention;
Figure 11 is the schematic diagram of explanation according to the generation of encryption key used in the device of the present invention;
Figure 12 is the schematic diagram of explanation according to another generation of encryption key used in the device of the present invention;
Figure 13 is the again schematic diagram that generate of explanation according to encryption key used in the device of the present invention;
Figure 14 is the schematic diagram of explanation according to the another generation of encryption key used in the device of the present invention;
Figure 15 is the form that key element be set of explanation according to the encryption level of carrying out in the device of the present invention;
Figure 16 is the flow chart of explanation according to another operation of device of the present invention; And
Figure 17 is the flow chart that is used to illustrate according to the another operation of device of the present invention.
Embodiment
Below, with reference to the accompanying drawings embodiments of the present invention are elaborated.
Fig. 1 shows an embodiment of the invention.In Fig. 1, label 11 expression master controllers, its controlling packet is contained in the operation and the order of each parts in the MFP device (being also referred to as image processing apparatus).Label 12 expression readers comprise the scanner that is used for input picture.The view data that is read by reader 12 is provided for reading images treatment circuit 13, and digitlization therein, temporarily is stored in the buffer storage 14 then.Buffer control unit 15 controls are to the access and the removing of buffer storage 14.Buffer control unit 15 is also controlled buffer storage 16.Buffer storage 16 is used for temporary transient storage data when print image data.The output of buffer storage 16 is provided for the print image treatment circuit 17 that is used for Data Digital, and converts print image to, subsequently, sends to printer 18.
When the output with buffer storage 14 temporarily was stored in the storage device (HDD) 32, device of the present invention can be stored after it is encrypted.In addition, also be provided with virtual disk drive 33 in order to store data.Virtual disk drive 33 comprises volatile memory, so that can not stay data later on.
This device provides encryption and the decryption device that is used for above-mentioned encryption.This device also has been equipped with encryption key and the rank control part that is used to control these encryptions and decryption device.The back will describe this control part (device) in detail.
The output of buffer storage 14 is input to encryption device 23, encrypts therein then.On the basis of the access control of storage control circuit 31, input to HDD 32 through ciphered data, record in the hard disk then.This device also has been equipped with the virtual disk drive 33 that comprises volatile memory.But the data behind virtual disk drive 33 storage encryptions.
When the view data printed corresponding to the storage data, first playback record in hard disk data or the data in the volatile memory, be sent to decryption device 24 by storage control circuit 31 then.To offer buffer storage 16 by decryption device 24 decrypted data, then, be transferred to print procedure.After a series of copying operation finished, buffer control unit 15 was removed the data that are stored in buffer storage 14 and 16, thereby view data is wiped.
Be provided with the encrypted master 21, encryption level code controller 22 and the encrypt pin generating circuit 25 that are associated with above-mentioned encryption device 23, decryption device 24.
Encrypted master 21 is provided with the encryption level sign indicating number (at a plurality of encryption levels) of encryption level code controller 22.In the case, encrypted master 21 is provided with the encryption level sign indicating number according to the quantity of the encryption key in the encrypt pin generating circuit 25.Encrypted master 21 and encryption level code controller 22 control encryption devices 23, and encryption level is set.In addition, encrypted master 21 and encryption level code controller 22 are also controlled decryption device 24, and the deciphering rank (decoding rank) corresponding to encryption level is set.The key of encrypt pin generating circuit 25 is used for above-mentioned encryption and decrypting process.
Label 41 expression users are used for the guidance panel of operating means.For example, guidance panel 41 has been equipped with LCDs, touch pad input part and action button.Guidance panel controller 42 control operation panels 41, and read from the data of guidance panel 41 inputs.Guidance panel controller 42 links to each other with loud speaker 50 (or buzzer), and the pilot operationp program.
Label 43 expression external keys.When being written into external key 43, key testing circuit 45 detects external key 43 by external key interface circuit 44.Guidance panel controller 42 obtains the information that is written into of external key.Encrypt pin generating circuit 25 also can obtain this external key.
Label 46 expression internal key circuit.In encrypt pin generating circuit 25, also can obtain the internal key of internal key circuit 46.The ID of internal key is offered ID testing circuit 47, and carry out verification with the ID that imports from guidance panel 41 by the user.ID testing circuit 47 can also carry out verification with ID that obtains by network interface circuit 48 and the ID that is stored in the internal key circuit 46.Check results is shown on the display part of guidance panel 41 according to the control of guidance panel controller 42.
The operation sequence of this device below will be described.Hereinafter with reference to Fig. 2 A that shows the various demonstration embodiment on the guidance panel 41~Fig. 2 F, Fig. 3 A~Fig. 3 D and Fig. 4 A~Fig. 4 G this operation sequence is described.
[under the duplicating situation]
At first, the user selects copy mode (Fig. 2 A, Fig. 3 A) from guidance panel 41.Fig. 2 A~Fig. 2 F shows when the user duplicates with encryption level 2, the demonstration embodiment on the guidance panel 41 (graphic user interface (GUI)).Fig. 3 A~Fig. 3 D shows when the user duplicates with encryption level 1, the demonstration embodiment on the guidance panel 41.Label 100 expressions are equipped with the liquid crystal display area of touch panel.Be provided with function key and numeric keypad around the viewing area 100.
When duplicating, the user selects " duplicating " button 101.When hope realized encrypting, the user pressed " maintaining secrecy " button 102.So screen display has become the content shown in Fig. 2 B, that is, demonstrate the request screen that is used to be provided with encryption level.Specifically, demonstrate information and " please specify encryption level ", simultaneously, also demonstrate rank 0 button 103, rank 1 button 104 and rank 2 buttons 105 on it.In addition, demonstrate " cancellation " and reach " determining " button 106 and 107.Next, subscriber selector stage other 2 (the highest encryption level) button 105 then, is pressed " determining " button.So, as shown in Fig. 2 C, demonstrate information and " please import (you) ID ", simultaneously, demonstrate ID input part and password input part 108 and 109.
The user utilizes numeric keypad to import his ID, then, presses " determining " button.As shown in Fig. 2 D, demonstrate information and " please enter password ".The user enters password, and then, presses " determining " button.In the case, if do not load external key 43, the information that then demonstrates shown in Fig. 2 E " does not load encryption key, please load encryption key ".When the user had loaded external key 43 and touched " loading " button 110, display screen was back to the initial screen shown in Fig. 2 F, and demonstrated " maintaining secrecy 2 ", and the expression current state is an encryption level 2.Like this, can carry out encryption level is 2 duplicating.
After task (JOB) finishes, be stored in and be used for encrypted secret key by pressing reboot button or abolishing in the encrypt pin generating circuit 25 by automatic removing timer.If loaded external key, then take following program to prevent that the user from forgetting taking-up (cancelling) external key.Particularly be on display screen, to demonstrate the information of urging the user to take out external key, simultaneously, give a warning to the user by loud speaker 50.
When key is abolished by automatic removing or carried out the inspection of external key, can send and prevent that the user from forgetting the warning of taking out external key.
Fig. 3 A~Fig. 3 D shows operation sequence when encryption level 1 is set and the demonstration embodiment on guidance panel 41 thereof.Fig. 3 A shows the identical show state as shown in Fig. 2 A, thereby provides the state of encryption level 0, and the information that demonstrates simultaneously " maintains secrecy 0 ".When the user selects " duplicating " button 101 and presses " maintaining secrecy " button 102, with the picture that obtains shown in Fig. 3 B.
Specifically, demonstrate information and " please specify encryption level ", simultaneously, demonstrate rank 0~2 button 103~105 on it.In addition, demonstrate " cancellation " and " determining " button 106 and 107.The user has selected rank 1 button 104, and presses " determining " button.Shown in Fig. 3 C, demonstrate information and " please import ID ", simultaneously, demonstrate ID input part and password input part 108 and 109.
The user uses numeric keypad to import his ID, then, presses " determining " button.So, as shown in Fig. 3 D, demonstrate information and " please import (you) password ".The user enters password, and then, presses " determining " button.Like this, promptly be provided with copy function according to encryption level 1.Subsequently, display screen is back to the state of Fig. 3 A; At this moment, demonstrate information on it and " maintain secrecy 1 ".
For example, the view data that is read by reader 12 when the user wishes to duplicate is kept in this device, and requires to encrypt.Said procedure only carries out based on encryption level 2; In the case, can not select " rank 1 ".When virtual disk drive 33 was used for the view data of save set, if power cut-off, then data content will be eliminated.For this reason, when selecting hold function, will use HDD.Yet, consider and may some people deliberately from HDD, fetch data, so require to strengthen encryption level.For this reason, only carry out encryption based on " rank 2 ".Under the situation of using " rank 0 " of not encrypting, utilize HDD to carry out copying operation as usual, rather than utilize virtual disk drive 33.
Fig. 4 A~Fig. 4 G shows the demonstration embodiment on the guidance panel 41 when the user has logined the personal authentication's data that comprise above-mentioned ID and password in advance.If the user wishes to login personal authentication's data, then the user presses " function " button 121 as shown in Fig. 4 A.In the case, the icon of the various functions that demonstrate indication device and had and represent the character of these functions.Though do not demonstrate all icons, following will provide with character style.For example, " energy-conservation ", " ground paper (thick paper) ", " general ", " language switching ", " total counter ", " login ", " date " and " maintaining secrecy ".Next, owing to wish login and security-related personal authentication's data, the user selects and supresses " maintaining secrecy " icon 122.
So display screen is transformed into the picture shown in Fig. 4 B.In the picture of Fig. 4 B, require input ID.When the user pressed " determining " button 107 after input ID, the information that will demonstrate shown in Fig. 4 C " please be entered password ", and demonstrates the character keys that is used to enter password.When the user enters password and press " determining " button 107, will shown in Fig. 4 D, demonstrate the expression display part 124 that the first time, password was transfused to.When pressing " determining " button 107, will shown in Fig. 4 E, demonstrate information and " please enter password once more ", and demonstrate the character keys that is used to enter password.When the user enters password once more and press " determining " button 107, will shown in Fig. 4 F, demonstrate the expression password second time and import the display part 125 that finishes.When the user presses " determining " button 107, will as shown in Fig. 4 G, demonstrate information " login finishes ".
In the screen of Fig. 4 F, under following situation, demonstrate and urge the user maybe can provide voice messaging in this information of entering password.A kind of situation be enter password for the second time with enter password for the first time inequality.Another kind of situation is to have imported invalid password.Another situation is that the id number of input is used.
Fig. 5 A~Fig. 5 D shows when the data that send by network are stored in hard disk or the virtual disk, the demonstration embodiment on the guidance panel 41.Especially, this demonstration embodiment shows the method for appointed task.
At first, the user presses " state " button 131 as action button.Printout display part 132 is made mark.Be shown as form with being stored in data list in hard disk or the virtual disk, stored file 133~135 as can be seen by filename, user name, the order on storage date.Encrypted by row (by key icon (not shown)) the expression data that oblique line shows.
Next, utilize cursor select File 134 (encrypting), and press " maintaining secrecy " display part 136.So, as shown in Fig. 5 B, demonstrate information and " please import ID ".When the user inputs to ID ID input part 137 and presses " determining " button 107, will demonstrate information and " please enter password ".When the user inputed to password password input part 138 and presses " determining " button, with the display screen that provides as shown in Fig. 5 D, and the information that obtains " was printed ".
Fig. 6 shows the flow chart of the operation when reading (scanning) file in device of the present invention.To install energising, then, when opening master controller and other device with system initialization; So on guidance panel 41, obtained (the step SA1~SA3) of the display frame shown in Fig. 2 A.In this show state, determine whether to carry out based on user's selection and encrypt (step SA4).Encrypt if carry out, then in step SA5, select rank 1 or rank 2.If selected rank 1, then carry out personal authentication's program (step SA6), then, handling process goes to step SA11, determines file and begins read operation.If selected rank 2, then carry out personal authentication's program (step SA7), determine whether to have connected external key (step SA8, SA9), urge when externally key does not have to connect upward and carry out the connection (step SA10) of external key.When external key connected upward, handling process went to step SA11.
In case file is determined, and beginning file read operation, scanning (step SA12) just begun.Then, determine whether the view data that is read is necessary to encrypt (step SA13).If needn't encrypt (step SA14), then do not encrypt and just view data is sent to hard disk drive 32.After view data is transmitted, buffer storage 14 is emptied.
If in step SA13, determine and to encrypt, determine that then encryption level is rank 1 or rank 2 (step SA16).If determine that encryption level is a rank 1, then utilize internal key to set up encryption key (step SA17).Then, perform encryption processing, then, view data is sent to hard disk drive (step SA18).If determine that in step SA16 encryption level is a rank 2, then utilizes inside and outside key to set up encryption key (step SA19).Then, utilize encryption key to carry out and encrypt, then, view data is sent to hard disk drive (step SA20).
Fig. 7 is the flow chart of the operation of explanation when printing the view data that reads by network or reader 12.The view data that reader 12 is read is temporarily stored in virtual disk drive 33 or hard disk drive 32.Fig. 7 shows the flow process of reads image data state.
Based on the content (for example, described in Fig. 5 A~Fig. 5 D) of the management data in the admin table, determine whether the current typescripts of wanting is encrypted.If file is encrypted, determine that then encryption level is which rank (step SB1, SB2) in rank 0, the rank 1 or 2.If encryption level is a rank 0, then file data is sent to printing path by hard disk drive, and does not carry out the program relevant with encryption.Then, determine that file is encryption level 1 or the data (step SB2) that PC sent.If file is encryption level 1 and is the signal that PC sends that then determining to carry out duplicating still is to carry out printout (step SB3).If execution printout, the then operation described in execution graph 5A~Fig. 5 D.Specifically, select to want the file (step SB4) of printout, carry out personal authentication's program (step SB5, SB6) then.After finishing personal authentication's program, utilize internal key to rebuild encryption key, and to enciphered data deciphering (step SB7, SB8).Export the data after the deciphering to printing path.
If in step SB2, determined target data neither encryption level 1 neither PC sends signal, then determine whether to have loaded external key (step SB9).If do not load external key, then urge loading external key (step SB10).Then, after having loaded external key (step SB11), rebuild encryption key.In the case, carry out this program according to encryption level 2, thereby, utilize inside and outside key to rebuild encryption key.Utilize this encryption key to carry out deciphering (step SB13).Data after the deciphering are sent to print image treatment circuit 17 (step SB14, SB15) by virtual disk and buffering memory.
After printing (step SB15) is finished, virtual disk (volatile memory) and buffering memory 16 are emptied.Then, determine whether to have installed external key.If external key has been installed, then provides the warning of removing external key and show (or voice warning) (step SB16, SB17).After the abolishment external key is finished, then obtain to duplicate to finish demonstration, provide the demonstration (step SB19) that is in " standby " state simultaneously.
Fig. 8 is the flow chart that the operation when handling the data that come from PC (PC) is described.Owing to before processing comes from the data of PC, at first send the information that has or not encryption and ID/ password, confirm this information (step SD10) earlier.Encrypt if carry out, then carry out personal authentication's program (step SD11), then, prepare internal cryptographic (step SD12) according to the ID/ password.Utilize the encryption key of being prepared with the data encryption (step SD13) of sending, subsequently, be stored in (step SD14) in the virtual disk drive.
Encrypted print data can not printed immediately, and print out task is in suspended state.The user selects necessary task (file) by the guidance panel of machine (device), and indication is printed then.When carrying out printing, urge the user to import the ID/ password.After input is finished, carry out personal authentication's program, and prepare encryption key once more and come data decryption, subsequently, the view data after the deciphering is printed.If specified data is not encrypted in step SD10, so with Data Receiving, and be sent to print procedure by virtual disk drive, and not with its encryption (step SD15, SD16).After printing is finished, be stored in virtual disk drive and the data of buffering in the memory with duplicate in identical mode remove.
Step SC1~SC5 is the processing on PC (PC) side.More specifically, start application program (step SC1), and secure printing processing (SC2) is set.Then, determine whether to carry out and encrypt (step SC3), and definite password (step SC4), subsequently, beginning (step SC5) is printed in indication.
Fig. 9 is the operational flowchart of explanation login personal authentication data.GUI when having described login personal authentication data among Fig. 4 A~Fig. 4 G.In brief, when logging program starts, input ID (step SE1).If identical ID exists, then require the different ID (step SE2) of input once more.When the ID input is finished, enter password requiring (step SE3).Require to enter password once more then (step SE4).If above-mentioned twice input results is identical, then prepare encryption key (step SE5, SE6).Utilization is encrypted (step SE7) by the encryption key that encrypt pin generating circuit 25 generates with personal authentication's data (ID is provided with and password set), and is stored in (step SE8) in the internal key circuit 46.Thus, the login of personal authentication's data is finished.
Figure 10 is the flow chart that personal authentication's data of the such login of explanation are carried out the operation of verification.Personal authentication's data of input were encrypted when utilization will be logined by the encryption key that verify data generated by encrypt pin generating circuit 25, then, were stored in the internal key circuit 46.
Carry out personal authentication's program as follows.At first, by guidance panel 41 input ID and passwords (step SF1, SF2).If there be (step SF3) in corresponding ID, encrypt pin generating circuit 25 generates encryption key (step SF4) so.Take out in the data of enciphered data from be stored in internal key circuit 46 of ID by guidance panel 41 input, subsequently, the encryption key that generates before utilizing is decrypted (step SF5).The ID that will be obtained by deciphering and the ID and the password of password and input carry out verification (step SF7), subsequently, judge they whether identical (step SF8).If ID is identical with password, then the personal authentication finishes (step SF9).In step SF3, do not preserve if meet the ID of the ID that is imported, then urge the user to re-enter ID and password (step SF10, SF11).In the case,, then provide the demonstration that makes mistakes if input error has surpassed pre-determined number, then, personal authentication's EP (end of program) (step SF12, SF13).
The method that generates inside and encryption key is described hereinafter with reference to Figure 11 and Figure 12.
In device, internal key and encryption key made up to generate and be actually used in encrypted secret key.Below provide two execution modes that generate inside and encryption key.According to embodiment, two kinds of combination of keys have been used; In the case, even used three kinds or multiple key, combination of keys can be expanded equally.On the other hand, promptly be used in the primary key that generates encryption key and have only a kind ofly, present embodiment equally also is suitable for.
[generation is used for first execution mode of encrypted secret key]
Figure 11 shows password table CT1.For example, make up and generate internal key by being selected from numeral in " 0 "~" 6 ".On the other hand, make up by the letter that will be selected from " A "~" G " and generate external key.Referring to the password table CT1 of Figure 11, array is in column direction, and letter is arranged in line direction.6 any passwords are distributed in each intersection of matrix.
For example, external key " DBEFAGC " is provided with according to internal key data " 2301456 ".In the case, at first internal key " 2 " and external key " D " contrast with the password table.Therefore, obtained to be positioned at the row corresponding with each value and the row intersection location (2, data D) " 011010 ".Similarly, can obtain location point (3, data B) " 001011 ".Location point (0, E), (1, F), (4, A), (5, G) and (6, each data C) obtain in the same manner as described above.These data are combined in one continuously, thereby generate the new key with following data:
“011010?001011?011101?101001?000100?110000?010101”
Extracted the wherein part of inside and external key herein.Then, contrast with form.In the case, this extracting mode can be carried out by 1 bit base.Yet if the amount of extracting is too big, reference table also can become bigger so; For this reason, should carry out extraction carefully.
[generation is used for second execution mode of encrypted secret key]
Second execution mode relates to the generation method of more complicated encryption key.Figure 12 shows two kinds of password tables is made up the method that generates encryption key.In Figure 12, show password table CT1 and CT2.Password table CT1 and identical shown in Figure 11 just now.Internal key has and begins the continuous arrangement from " 0 "~" 6 " from the left side, and external key has and begins the continuous arrangement from " A "~" G " from the top; Relative therewith, among the password table CT2, internal key has and begins the continuous arrangement from " 6 "~" 0 " from the left side, and external key has the arrangement that begins from the top continuously from " G "~" A ".In the case, any password of 6 has the identical arrangement with password table CT1.
For example, external key " FBDEAGC " relative interior key data " 2301456 " is provided with.At first, from password table CT1, extract internal key " 2 " and external key " F " combined location point (2, data F) " 101000 ".Simultaneously, from password table CT2, extract internal key " 2 " and external key " F " combined location point (2, data F) " 001001 ".Above-mentioned two data are combined in one, thereby, password " 101000001001 " generated.
From each password table, extract data, subsequently, be similar to first execution mode and carry out combination like that, thereby, the following password of final acquisition:
“101000001001?001011100111?011100010110?011110010100000100101101?110000000001?01010101101”。
In the case, though only the data that merely will extract from two password tables are combined in one, yet the data that extract from each password table are to be combined in one after a plurality of being divided into, thereby, can generate more complicated encryption key.
Figure 13 shows cuts apart the data that extract also in conjunction with the embodiment with the more complicated encryption key of generation from each inside and external key table.For example, (password) data of extracting of key list are " 101000 " internally, and the data that extract from the external key table are " 100100 ".If above-mentioned two data are carried out combination (situation 1) simply, then obtain encryption key " 101000100100 ".If these data are evenly divided and combination (situation 2), then obtain encryption key " 101010010000 ".If these data are divided (situation 3) unevenly, then obtain encryption key " 110010100000 ".
When encryption level is rank 1, encrypt if only utilize internal key to carry out, generate encryption key according to following method so.
In Figure 14,, then use preset value (for example, " 000000 ") to replace external key if the data " 2301456 " that internal key generated are not provided with external key.With data combination simply, and carry out disposable division and combination, thereby can obtain more complicated encryption key according to certain rule.
Particularly, the data that internal key generated are " 101000 ".If these data simply in conjunction with (situation 1), are then obtained encryption key " 101000000000 ".If these data are divided and combination (situation 2) equably, then obtain encryption key " 100010000000 ".If these data are divided (situation 3) unevenly, then obtain encryption key " 100100000000 ".
Point out in passing,,, must generate identical encryption key so if inside and external key have identical value according to the generation method of this encryption key.Encryption key for good and all is not stored in the device, but owing to every task generates, and in the time of task termination and abolished.
Identical with the production method of above-mentioned encryption key, by using ID and password and, can generating internal key with reference to form.Internal key also is owing to every task generates, and in the time of task termination and abolished.
The password size of the final encryption key that generates must be in the usable range of encryption device 23 and decryption device 24.For this reason, used password table must be considered the specification of above-mentioned encryption and decryption device 23 and 24 and generation in advance among Figure 11 and Figure 12.
The form of Figure 15 shows the various functions relevant with the encryption of device of the present invention.In the form of Figure 15, show encryption level 0,1 and 2 with the horizontal order of top column.Encryption level 0 is corresponding to " ordinary file ".Encryption level 1 is corresponding to " vital document ".Encryption level 3 is corresponding to " classified papers ".Encryption level 0 is corresponding to " nothing " input key.Encryption level 1 is corresponding to " internal key (being used for the personal authentication) ", encryption level 2 corresponding with internal key (being used for the personal authentication) and external keys.Generate table (described in Figure 11 and Figure 12) at encryption key, " nothing " encryption key is used for encryption level 0." a kind of " encryption key is used for encryption level 1." one or both " encryption key is used for encryption level 2.Cipher Strengths at different levels are as follows.Encryption level 0 is " not encrypting ", and encryption level 1 is " weak ", and encryption level 2 is " complexity ".The use of each rank China and foreign countries portion key is as follows.External key is " not needing " in encryption level 0 and 1, and " hard key " must be arranged in encryption level 2.
Figure 16 is the flow chart of another execution mode inequality of the execution mode described in explanation and Fig. 6.This execution mode shows the program when utilizing external key to read file.More specifically, only when encryption level is rank 2, just can use external key in the present embodiment.Thereby, if inserted external key in advance, so when detecting external key automatically encryption level be set to " rank 2 ".In Figure 16, use identical label to represent and the corresponding step of the execution mode described in Fig. 6.When in step SA3, determining whether to carry out encryption, will detect the connection status (step SA25) of external key.Then, encryption level is set to rank 2 (step SA26).In the case, determine whether encryption level is changed (step SA27).If do not make change, then carry out personal authentication's program (step SA29), subsequently, the indication flow process goes to step SA11.If make the change of encryption level, determine that so encryption level is rank 1 or 0 (step SA28).If encryption level is a rank 1, then in step SA30, carry out personal authentication's program, subsequently, the indication flow process goes to step SA11.If encryption level is a rank 0, then indicates flow path device step SA11, and do not carry out personal authentication's program.Other steps are identical with Fig. 6; Therefore, do not give unnecessary details.
Figure 17 is the flow chart of the another execution mode inequality of the execution mode described in explanation and Fig. 6.In Figure 17, use identical label to represent and the corresponding step of the execution mode described in Fig. 6.Referring to the flow chart of the execution mode of Figure 17, load external key (step SA25), subsequently, before scanning document, from external key, extract secret cipher key code, then, be stored in (step SA31) in the device.Encryption level is set to rank 2, and then, the buzzer that sounds (step SA32) provides the prompting that can unload external key.Thus, the user can store and manage external key safely.
The validity feature that the present invention had is described below:
(1) upperseat concept:
(1-1) according to the present invention, Cipher Strength can be set to a plurality of ranks, that is, and and two-stage or more than two-stage.
(1-2) can utilize a plurality of keys to change encryption level.
(1-3) encrypt in the required key one and play effect as the data that are used to carry out the personal authentication.
(1-4) user can freely change encryption level according to confidentiality.
(1-5) utilize the virtual disk drive on the RAM carry out to encrypt, and task empty RAM after finishing.
(1-6) encryption key utilizes hardware to generate, and is to prepare for every task, and is abolished after task termination.
(1-7) therefore, according to file content Cipher Strength is set freely.Encryption key is to prepare for every task, and removes after task termination, thereby can prevent the leakage of key information.Cipher Strength is established by force more, thereby the decline of processing speed also is predictable.Yet, provide a plurality of encryption levels, thereby the user can be based on the balance of processing speed, Cipher Strength and file security, freely select be the processing time preferentially or maintain secrecy preferential encryption level.Thereby, be provided with the encryption level selection portion.
(1-8) when using printer, can encrypt setting in the setting of printing on PC.In the case, can import the secret cipher key code that is used to carry out personal authentication's program.
(1-9) when obtaining printout, be used to carry out the key execution encryption of personal authentication's program.Therefore, do not carry out personal authentication's program and just can not get access to printout.
(1-10) therefore, even will install, also encryption can be set, thereby can prevent that printout is seen by the third party or stolen before obtaining print result as printer.
(1-11) utilize the virtual disk drive that comprises easy mistake RAM to carry out and encrypt, and do not utilize HDD to carry out encryption.Be provided with the portion of virtual disk drive.
(1-12) when execution comprised the processing that device is stored, enciphered data was stored among the HDD.In the case, enciphered data is only to store with high encryption level.
Be stored in wherein data even (1-13) have the people to steal device with extraction, the data that are stored in the virtual disk drive when the device outage also will be eliminated.Therefore, can prevent the leakage of information.
(2) meta notion:
(2-1) according to the present invention, Cipher Strength can be set to a plurality of ranks,, comprises the two-stage of not encrypting or more than two-stage that is.
(2-2) according to Cipher Strength with two or more than two cipher key combinations, thereby, can change rank.Device of the present invention has been equipped with rank change portion.
(2-3) user can freely be provided with encryption level according to the importance of the file that will print or duplicate.Device of the present invention has been equipped with encryption level portion has been set.
(2-4) encrypt the effect that in the required key one plays the data that are used to carry out personal authentication's program.
(2-5), id number and password must be logined in advance as the data that are used to carry out personal authentication's program.Thereby device of the present invention has been equipped with login portion.
(2-6) user can freely be provided with id number.Device of the present invention has been equipped with heavily imports instruction unit, is used for id number that the user is provided with and logins the ID that finishes and carry out verification, if identical ID exists, then urges the user to re-enter ID.
The key that (2-7) generates in the use device is encrypted each user's ID and password, and with its be stored in from the external world can't reference the place.
(2-8) therefore, Cipher Strength can change according to the confidentiality of file.By using a plurality of keys, thereby even taking place under the worst situation, it more is difficult to data decryption than only utilizing single key to encrypt.In addition, if strengthen Cipher Strength, the measurable processing speed that arrives will descend.In order to address this problem, a plurality of encryption levels are provided.Therefore, the user is based on the balance of conversion speed, Cipher Strength and file security, can freely select the processing time preferentially or maintain secrecy preferential encryption level.In addition, can also be set to not encrypt, thereby ordinary file can duplicate and printout according to the program of generally being carried out.Therefore, can guarantee and the regular situation identical operations.
(2-9) when using printer, in the printer setup on PC password is set.
(2-10) when obtaining printout, input is used for determining individual's password and authentication codes thereof, thereby, can carry out access to print queue.Therefore, can print output (, just not allowing printout) if do not carry out personal authentication's program.
(2-11) therefore, when using printer, also encryption can be set.Like this, than conventional secure printing, can obtain higher fail safe.
(2-12) when carrying out encryption, utilize the virtual disk drive storage data on the RAM, and after task is finished, used ram region is emptied.
(2-13) after the task termination, the encryption key that will be used to encrypt is removed.
(2-14) after the task termination, used buffer memory is emptied, thereby the data of storage are eliminated.
(2-15) encryption key is to prepare for every task, and is abolished after task termination.
(2-16) after the task termination, encryption key can not be stored in the machine; Therefore, the problem that encryption key leaks can not take place.Even someone has stolen device and has been stored in wherein data with extraction, the data that are stored in the virtual disk drive when the device outage also will be eliminated.Therefore, can prevent the leakage of information.
(3) subordinate concept
(3-1) according to the present invention, encryption level is set to three ranks, that is, and and classified papers (rank 2), vital document (rank 1) and ordinary file (rank 0).
(3-2) be set to the file of classified papers (rank 2) except utilizing the encryption (password that in scanning document, is stored in the machine?) beyond the key, also utilize to come from outside private key code and encrypt.
(3-3) internal key that is stored in the machine must have been logined id number and password in advance.
(3-4) internal key that is stored in the machine plays the effect that is used for determining individual authenticate key.
(3-5) under the situation of classified papers (rank 2), when beginning to duplicate, provided the demonstration that requires the input external key, and urged the user to load external key.Under the situation of classified papers (rank 2), do not use external key just can not carry out duplicating/printing.
If (3-6) be set to vital document (rank 1), utilize the key rather than the external key that are stored in the machine to carry out encryption so.
If (3-7) be set to ordinary file (rank 0), do not carry out encryption (as common mode, operating) so.
(3-8) for anyone, all id number can be set freely.In login process, itself and the id number that setting completed are carried out verification, if there is identical ID, then urge the user to re-enter ID.
(3-9) in verification process, utilize the encryption (password of preparing based on by the ID and the password of guidance panel input?) key is decrypted the personal information (ID/ password) that is stored in the device and verification.
If (3-10) determined memory function, so with storage in hard disk and do not use volatile memory.In the case, demandable encryption level only is a rank 2.
(3-11) therefore, according to the confidentiality of file, Cipher Strength can be converted into three ranks.Use two keys, thereby even taking place under the worst situation, it also can strengthen safety of data than only utilizing single key to encrypt.If this Cipher Strength is provided with byer force, the so measurable processing speed that arrives will descend.In order to address this problem, a plurality of encryption levels are provided.Therefore, the user is based on the balance of processing speed, Cipher Strength and file security, can freely select the processing time preferentially or the preferential encryption level of confidentiality.In addition, can be set to not encrypt, thereby ordinary file can duplicate and printout according to the program of generally being carried out.Therefore, can guarantee and the regular situation identical operations.
A kind of in two kinds of keys is different for each user.For this reason, key can be used and act on the data of carrying out personal authentication's program, thereby, reduce to minimum will leak infringement.
(3-12) under situation about printing from PC, the level of security in can printing by printer setup.
If (3-13) encryption level is set in printing by printer, so after data are sent from PC, according to level of security with data encryption and storage.
(3-14) when obtaining printout,, except utilizing the personal authentication, also utilize external key to obtain printout according to encryption level.
(3-15) therefore, when using printer, also encryption can be set, compare, realize higher fail safe with usual manner.
(3-16) when carrying out encryption, enciphered data is stored in the virtual disk drive that uses volatile memory, and after task termination, virtual disk drive is emptied, thereby prevent to leak.
(3-17) after task termination, by the clear key on the push panel or remove timer automatically, encryption key can be removed.
(3-18) utilize id number and the password logined for every task in advance to generate internal key, when task termination, when removing encryption key, remove this internal key.
(3-19) ready key is encrypted each user's ID and password in the use device, and is stored in from installing the place that the outside can't reference.
(3-20) after the task termination, encryption key can not be stored in the machine; Therefore, do not have the leakage of encryption key.Ready encryption key is with personal information in the use device, that is, ID and password are encrypted and stored.Therefore, the means of identity information leakage have fully been taked to prevent.
The above is the preferred embodiments of the present invention only, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.Within the spirit and principles in the present invention all, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (19)

1. an encryption device that is used for image processing apparatus is characterized in that, described encryption device comprises:
Reader (12) is used for reading images;
Reading images treatment circuit (13) is used to handle the image that is read;
Printer (18) is used to carry out the printing to medium;
Print image treatment circuit (17) is used to carry out print image and handles to print;
Buffer storage (16) is used for view data and handles;
Encryption device (23) is used for the view data that inputs to described buffer storage is encrypted;
Storage device (32) is used to store the view data of having encrypted;
Decryption device (24) is used for the view data deciphering of having encrypted described;
External key testing circuit (45) is used to discern hard key;
Guidance panel (41) comprises that the user is used for carrying out various settings and is used for importing the ID that is used for personal authentication's program and the control panel of password;
Master controller (11) is used for totally controlling described reader, described reading images treatment circuit, described printer, described print image treatment circuit, described buffer storage, described encryption device, described decryption device, described external key testing circuit and described guidance panel; And
Encryption key and rank controller (22), when described encryption device was encrypted described view data, described encryption key and rank controller Cipher Strength were set to any one rank in two or more ranks.
2. device according to claim 1 is characterized in that, described encryption key and rank controller (22) comprise the memory of storing a plurality of keys, and comprises the encryption level change portion that is used for changing encryption level when selecting key.
3. device according to claim 1, it is characterized in that, described encryption key and rank controller (22) also comprise the variable portion of encryption level, and when the user changed encryption level according to confidentiality by described guidance panel indication, the variable portion of described encryption level freely changed encryption level.
4. device according to claim 1, it is characterized in that, described encryption key and rank controller (22) also comprise storage data dump portion, described storage data dump portion is carrying out when encrypting, use the virtual disk drive on the random access memory, simultaneously after task termination, with the data dump that is stored in the described random access memory.
5. device according to claim 1, it is characterized in that, described encryption key and rank controller (22) also comprise printout portion, when carrying out printing by described printer, described printout portion is used for obtaining the internal key of printout, thereby just often generates internal key to realize printout the personal authentication.
6. device according to claim 1 is characterized in that, described encryption key and rank controller (22) also comprise:
Virtual disk drive use portion, when carry out encrypting, what described virtual disk drive use portion used is the virtual disk drive that comprises volatibility RAM, rather than hard disk drive; And
Cipher Strength is provided with portion, and when the storage carried out described device, described Cipher Strength is provided with portion enciphered data is stored in the described hard disk drive, and encryption level intensity is set to have the rank of high encryption level simultaneously.
7. device according to claim 1, it is characterized in that, described encryption key and rank controller (22) also comprise: rank change portion, described rank change portion is according to including the Cipher Strength of not encrypting, by changing rank in conjunction with two or more keys.
8. device according to claim 1 is characterized in that, described encryption key and rank controller (22) comprise one that encrypts in required a plurality of keys, and it has played the effect of the data that are used to carry out personal authentication's program.
9. device according to claim 1 is characterized in that, described encryption key and rank controller (22) also comprise: password login portion, described password login portion have logined id number and password in advance as the data that are used to carry out personal authentication's program.
10. device according to claim 9, it is characterized in that, described encryption key and rank controller (22) also comprise: re-enter instruction unit, when the described id number of input, the described instruction unit of re-entering is carried out verification to set ID, if there is identical ID, then urge the user to re-enter ID.
11. device according to claim 9, it is characterized in that, described encryption key and rank controller (22) also comprise: preservation portion, described preservation portion uses the key of having prepared in device that each user's ID and password are encrypted, and they are stored in the memory that can't visit the outside.
12. device according to claim 1, it is characterized in that, described encryption key and rank controller (22) also comprise: response portion, when the output of the indication of the operation by external personal computer printer prints, described response portion responds to the encryption level indication of giving view data.
13. device according to claim 1 is characterized in that, described encryption key and rank controller (22) also comprise:
Removing portion is used for removing the encryption key that is used to encrypt after task termination;
Wipe portion, be used for after task termination, removing and wiping the data that are stored in employed buffer storage; And
Abolishment portion is used to every task to generate described encryption key, and after task termination described encryption key is abolished.
14. device according to claim 1, it is characterized in that, described encryption key and rank controller (22) are provided with three encryption levels, are used for the encryption level 2 of classified papers, the encryption level 0 that is used for the encryption level 1 of vital document and is used for ordinary file that is:.
15. device according to claim 14, it is characterized in that, described encryption key and rank controller (22) also comprise: additional encryption portion, when scanning document, described additional encryption portion also utilizes to come from extraneous special external key the described file that is set to described encryption level 2 is encrypted except the encryption key in utilization the is stored in described device.
16. device according to claim 14, it is characterized in that, described encryption key and rank controller (22) also comprise: control part, be used for the encryption of the described encryption level 2 of classified papers in basis, when beginning to duplicate, the information of described control part display requirement input external key, and urge the user to load described external key, do not duplicate and print so that do not use described external key just can't carry out.
17. device according to claim 14, it is characterized in that, described encryption key and rank controller (22) also comprise: add compact part, when what be provided with is when being used for the encryption level 1 of vital document, describedly adds the compact part utilization and is stored in the internal key in the described device and does not utilize external key to carry out encryption.
18. an encryption method that is used for image processing apparatus, described device scanning document to be obtaining view data, and described view data is encrypted, and then it is stored in the memory, it is characterized in that described encryption method may further comprise the steps:
On guidance panel, show the icon that a plurality of encryption levels are lined up, wherein,
Comprise not encrypting in described a plurality of encryption level to described view data;
When from described a plurality of icons, selecting first encryption level, require to be used for personal authentication's ID input by described guidance panel; And
When from described a plurality of icons, selecting second encryption level, require to be used for personal authentication's ID, and require the input external key by described guidance panel input.
19. method according to claim 18 is characterized in that, described encryption method is further comprising the steps of:
When from described a plurality of icons, selecting first encryption level, utilize internal key to generate encryption key, and utilize described encryption key that described view data is encrypted;
When from described a plurality of icons, selecting second encryption level, utilize inside and external key to generate encryption key, and utilize described encryption key that described view data is encrypted; And
Encrypted image data is stored in the volatile memory, and will be stored in the data dump in the described volatile memory after the view data of storing reading.
CNA2005100722282A 2004-08-09 2005-05-20 Encrypting method and encrypting apparatus for image processing apparatus Pending CN1735127A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/914,756 2004-08-09
US10/914,756 US20060031674A1 (en) 2004-08-09 2004-08-09 Encrypting method and encrypting apparatus for image processing apparatus

Publications (1)

Publication Number Publication Date
CN1735127A true CN1735127A (en) 2006-02-15

Family

ID=35758872

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2005100722282A Pending CN1735127A (en) 2004-08-09 2005-05-20 Encrypting method and encrypting apparatus for image processing apparatus

Country Status (3)

Country Link
US (1) US20060031674A1 (en)
JP (1) JP2006054876A (en)
CN (1) CN1735127A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043566B (en) * 2006-03-24 2010-04-21 京瓷美达株式会社 Image forming device having routine selectable activated by memory key
CN101859359A (en) * 2009-04-08 2010-10-13 黄金富 Secret treatment method and software for dividing file contents in to two parts, and decryption reader
CN101859360A (en) * 2009-04-08 2010-10-13 黄金富 File security processing method, corresponding software and decryption reading device
CN101296291B (en) * 2007-01-10 2011-07-06 三星电子株式会社 Image forming apparatus and method of outputting
CN103826026A (en) * 2014-03-21 2014-05-28 重庆大学 File sharing, printing and scanning method and file sharing, printing and scanning device
CN104640711A (en) * 2013-07-30 2015-05-20 京瓷办公信息系统株式会社 Display device and image forming device
CN114430319A (en) * 2020-10-29 2022-05-03 漳州立达信光电子科技有限公司 Parallel operation encryption and decryption system, transmitting end device and receiving end device

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4629555B2 (en) * 2005-11-07 2011-02-09 インターナショナル・ビジネス・マシーンズ・コーポレーション Restoration device, program, information system, restoration method, storage device, storage system, and storage method
JP4418814B2 (en) * 2005-12-01 2010-02-24 キヤノン株式会社 Information processing apparatus and information processing method
JP4322885B2 (en) * 2006-05-17 2009-09-02 京セラミタ株式会社 Image forming apparatus and image forming system
JP4779818B2 (en) * 2006-06-21 2011-09-28 コニカミノルタビジネステクノロジーズ株式会社 Image processing device
WO2008001628A1 (en) * 2006-06-30 2008-01-03 Nec Corporation Distributed information generator and restoring device
JP2008035494A (en) * 2006-06-30 2008-02-14 Ricoh Co Ltd Image processing apparatus and image processing method
JP4267008B2 (en) * 2006-07-28 2009-05-27 Necインフロンティア株式会社 Client / server distributed system, server apparatus, client apparatus, and inter-client RTP encryption method used therefor
US8132014B2 (en) * 2006-08-29 2012-03-06 Xerox Corporation Image archiver
US8588421B2 (en) * 2007-01-26 2013-11-19 Microsoft Corporation Cryptographic key containers on a USB token
US20080298596A1 (en) * 2007-05-30 2008-12-04 Fujitsu Limited Image encryption/decryption system
JP4505004B2 (en) * 2007-09-28 2010-07-14 株式会社沖データ Image forming apparatus
JP4712023B2 (en) * 2007-11-30 2011-06-29 Sky株式会社 Document distribution system and document distribution program
JP4811440B2 (en) * 2008-09-24 2011-11-09 ブラザー工業株式会社 Image processing system and image reading apparatus
US9367779B2 (en) * 2010-01-07 2016-06-14 Seiko Epson Corporation Encryption processing device, encryption processing system and control method for encryption processing device
JP5656011B2 (en) * 2010-08-16 2015-01-21 コニカミノルタ株式会社 Image processing apparatus and image processing method
JP5360043B2 (en) * 2010-12-20 2013-12-04 コニカミノルタ株式会社 Image processing device
PT2503518E (en) * 2011-03-22 2013-09-09 Kapsch Trafficcom Ag Method for validating a toll transaction
TWI559168B (en) * 2013-03-07 2016-11-21 國立成功大學 Data encryption system and method
JP7003614B2 (en) * 2017-12-11 2022-01-20 富士フイルムビジネスイノベーション株式会社 Information processing equipment, image forming equipment and programs
US11558740B2 (en) * 2020-09-23 2023-01-17 T-Mobile Usa, Inc. Dynamic encryption for scheduled message delivery

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0935182A1 (en) * 1998-01-09 1999-08-11 Hewlett-Packard Company Secure printing
US6598161B1 (en) * 1999-08-09 2003-07-22 International Business Machines Corporation Methods, systems and computer program products for multi-level encryption
US7266523B2 (en) * 2001-10-31 2007-09-04 Adamshand, Inc. Method and apparatus for allocating interviews based on dynamic pricing or auctions using electronic networks
US20030145218A1 (en) * 2002-01-31 2003-07-31 Xerox Corporation Encryption of image data in a digital copier
US6931597B1 (en) * 2002-04-17 2005-08-16 Pss Systems, Inc. Indications of secured digital assets
US7872767B2 (en) * 2003-04-04 2011-01-18 Xerox Corporation Parallel printing system
US7275159B2 (en) * 2003-08-11 2007-09-25 Ricoh Company, Ltd. Multimedia output device having embedded encryption functionality

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043566B (en) * 2006-03-24 2010-04-21 京瓷美达株式会社 Image forming device having routine selectable activated by memory key
CN101296291B (en) * 2007-01-10 2011-07-06 三星电子株式会社 Image forming apparatus and method of outputting
CN101859359A (en) * 2009-04-08 2010-10-13 黄金富 Secret treatment method and software for dividing file contents in to two parts, and decryption reader
CN101859360A (en) * 2009-04-08 2010-10-13 黄金富 File security processing method, corresponding software and decryption reading device
CN104640711A (en) * 2013-07-30 2015-05-20 京瓷办公信息系统株式会社 Display device and image forming device
CN103826026A (en) * 2014-03-21 2014-05-28 重庆大学 File sharing, printing and scanning method and file sharing, printing and scanning device
CN114430319A (en) * 2020-10-29 2022-05-03 漳州立达信光电子科技有限公司 Parallel operation encryption and decryption system, transmitting end device and receiving end device

Also Published As

Publication number Publication date
JP2006054876A (en) 2006-02-23
US20060031674A1 (en) 2006-02-09

Similar Documents

Publication Publication Date Title
CN1735127A (en) Encrypting method and encrypting apparatus for image processing apparatus
CN1188785C (en) Security administive system, data distributing equipment and portable terminal device
CN1265298C (en) Data storage apparatus, information processing apparatus and data-storage processing method
CN1264082C (en) Safety printing system
CN1708095A (en) Image processing method and image processing device
JP2006245949A (en) Image forming device
CN1959695A (en) Printing management system and printing management method
CN1518825A (en) Device arranged for exchanging data and method of authenticating
CN1946124A (en) Image processing system
CN1855808A (en) Device and method for providing security services
JP2006287587A (en) Information processing apparatus and its method
JP2008102633A (en) Image forming apparatus, user authentication system, control program for operating image forming apparatus, and computer-readable recording medium
CN1881871A (en) Monitoring apparatus and method of controlling the same
JP2008103867A (en) Image processor and program
US7564991B2 (en) Device, device control method, and program
JP2006139784A (en) Document processing device, and method and program for adding data encryption service to device
JP2007038674A (en) Imaging method and device having security protection capability
JP4666034B2 (en) Image processing apparatus, encrypted job execution method and execution program in the same
JP2004066692A (en) Image formation apparatus
JP2006094068A (en) Image processor
JP2006211590A (en) Image scanner, image reading method and image reading program
CN101079029A (en) Information processing apparatus, computer, information processing system, and information processing method
JP2005130261A (en) Image forming apparatus, its control method, and its control program
JP5730488B2 (en) Information processing system
JP2008287526A (en) Document management device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication